PCDRA Sample Questions for Palo Alto Networks Detection Analyst Exam
- CertiMaan
- Oct 26
- 6 min read
Prepare for the Palo Alto Networks Certified Detection and Remediation Analyst (PCDRA) exam with this focused collection of sample questions and practice material. These scenario-based questions cover threat detection, alert triage, incident response, and remediation across modern enterprise security environments. Designed for entry-level SOC analysts and cybersecurity professionals, this PCDRA resource includes dumps, real-world practice tests, and question formats that reflect the actual exam structure. Whether you're looking to reinforce core concepts or simulate exam conditions, this guide provides the tools you need for success in earning your Palo Alto PCDRA certification.
PCDRA Sample Questions List :
1. In the Cortex XDR console, from which two pages are you able to manually perform the agent upgrade action? (Choose two.)
Endpoint Administration
Asset Management
Action Center
Agent Installations
2. Which license is required when deploying Cortex XDR agent on Kubernetes Clusters as a DaemonSet?
Cortex XDR Pro per TB
Host Insights
Cortex XDR Pro per Endpoint
Cortex XDR Cloud per Host
3. When creating a BIOC rule, which XQL query can be used?
dataset = xdr_data | filter event_sub_type = PROCESS_START and action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
dataset = xdr_data | filter event_type = PROCESS and event_sub_type = PROCESS_START and action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
dataset = xdr_data | filter action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe" | fields action_process_image
dataset = xdr_data | filter event_behavior = true event_sub_type = PROCESS_START and action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
4. Where can SHA256 hash values be used in Cortex XDR Malware Protection Profiles?
in the macOS Malware Protection Profile to indicate allowed signers
in the Linux Malware Protection Profile to indicate allowed Java libraries
SHA256 hashes cannot be used in Cortex XDR Malware Protection Profiles
in the Windows Malware Protection Profile to indicate allowed executables
5. When creating a scheduled report which is not an option?
Run weekly on a certain day and time
Run quarterly on a certain day and time
Run monthly on a certain day and time
Run daily at a certain time (selectable hours and minutes)
6. What functionality of the Broker VM would you use to ingest third-party firewall logs to the Cortex Data Lake?
Netflow Collector
Syslog Collector
DB Collector
Pathfinder
7. When using the “File Search and Destroy” feature, which of the following search hash type is supported?
SHA256 hash of the file
AES256 hash of the file
MD5 hash of the file
SHA1 hash of the file
8. A Linux endpoint with a Cortex XDR Pro per Endpoint license and Enhanced Endpoint Data enabled has reported malicious activity, resulting in the creation of a file that you wish to delete. Which action could you take to delete the file?
Manually remediate the problem on the endpoint in question
Open X2go from the Cortex XDR console and delete the file via X2go
Initiate Remediate Suggestions to automatically delete the file
Open an NFS connection from the Cortex XDR console and delete the file
9. Can you disable the ability to use the Live Terminal feature in Cortex XDR?
Yes, via Agent Settings Profile
No, it is a required feature of the agent
No, a separate installer package without Live Terminal is required
Yes, via the Cortex XDR console or with an installation switch
10. Which of the following Live Terminal options are available for Android systems?
Run Android commands
Live Terminal is not supported
Run APK scripts
Stop an app
11. What kind of malware uses encryption, data theft, denial of service, and possibly harassment to take advantage of a victim?
Rootkit
Keylogger
Ransomware
Worm
12. An attacker tries to load dynamic libraries on macOS from an unsecure location. Which Cortex XDR module can prevent this attack?
DDL Security
Hot Patch Protection
Kernel Integrity Monitor (KIM)
Dylib Hijacking
13. While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?
mark the incident as Unresolved
create a BIOC rule excluding this behavior
create an exception to prevent future false positives
mark the incident as Resolved – False Positive
14. Which profiles can the user use to configure malware protection in the Cortex XDR console?
Malware Protection profile
Malware profile
Malware Detection profile
Anti-Malware profile
15. Which type of IOC can you define in Cortex XDR?
Source port
Destination IP Address
Destination IP Address:Destination
Source IP Address
16. Which Type of IOC can you define in Cortex XDR?
destination port
e-mail address
full path
App-ID
17. You can star security events in which two ways? (Choose two.)
Create an alert-starring configuration
Create an Incident-starring configuration
Manually star an alert
Manually star an Incident
18. When selecting multiple Incidents at a time, what options are available from the menu when a user right-clicks the incidents? (Choose two.)
Assign incidents to an analyst in bulk
Change the status of multiple incidents
Investigate several Incidents at once
Delete the selected Incidents
19. When creating a custom XQL query in a dashboard, how would a user save that XQL query to the Widget Library?
Click the three dots on the widget and then choose “Save” and this will link the query to the Widget Library
This isn’t supported, you have to exit the dashboard and go into the Widget Library first to create it
Click on “Save to Action Center” in the dashboard and you will be prompted to give the query a name and description
Click on “Save to Widget Library” in the dashboard and you will be prompted to give the query a name and description
20. What is an example of an attack vector for ransomware?
A URL filtering feature enabled on a firewall
Phishing emails containing malicious attachments
Performing DNS queries for suspicious domains
Performing SSL Decryption on an endpoint
21. While working the alerts involved in a Cortex XDR incident, an analyst has found that every alert in this incident requires an exclusion. What will the Cortex XDR console automatically do to this incident if all alerts contained have exclusions?
mark the incident as Unresolved
create a BIOC rule excluding this behavior
create an exception to prevent future false positives
mark the incident as Resolved – Auto Resolve
22. As a Malware Analyst working with Cortex XDR you notice an alert suggesting that there was a prevented attempt to open a malicious Word document. You learn from the WildFire report and AutoFocus that this document is known to have been used in Phishing campaigns since 2018. What steps can you take to ensure that the same document is not opened by other users in your organization protected by the Cortex XDR agent?
Enable DLL Protection on all endpoints but there might be some false positives
No step is required because Cortex shares IOCs with our fellow Cyber Threat Alliance members
No step is required because the malicious document is already stopped
Install latest content updates to recognize and prevent the activity
23. What is the maximum number of agents one Broker VM local agent applet can support?
10,000
15,000
5,000
20,000
24. Which Exploit Protection Module (EPM) can be used to prevent attacks based on OS function?
Memory Limit Heap Spray Check
DLL Security
UASLR
JIT Mitigation
25. Why would one threaten to encrypt a hypervisor or, potentially, a multiple number of virtual machines running on a server?
To extort a payment from a victim or potentially embarrass the owners
To gain notoriety and potentially a consulting position
To better understand the underlying virtual infrastructure
To potentially perform a Distributed Denial of Attack
FAQs
1. What is the Palo Alto Networks Certified Detection and Remediation Analyst (PCDRA) certification?
The PCDRA certification validates your skills in detecting, analyzing, and responding to cybersecurity threats using Palo Alto Networks’ Cortex XDR platform and related tools.
2. How do I become a Palo Alto Certified Detection and Remediation Analyst?
You must pass the PCDRA exam, which assesses your ability to use Palo Alto Networks solutions to investigate alerts, analyze incidents, and implement remediation strategies.
3. What are the prerequisites for the Palo Alto Networks PCDRA certification exam?
There are no formal prerequisites, but familiarity with security operations, threat analysis, and Palo Alto’s Cortex XDR is highly recommended.
4. How much does the Palo Alto PCDRA certification exam cost?
The PCDRA exam typically costs $155 USD, though prices may vary slightly depending on region and currency.
5. What topics are covered in the PCDRA certification exam?
The exam includes topics such as incident detection, threat intelligence, Cortex XDR operations, data correlation, and response actions.
6. How difficult is the Palo Alto Networks PCDRA exam?
The exam is considered entry to intermediate level, suitable for security analysts, SOC professionals, or those starting in cybersecurity monitoring.
7. How long does it take to prepare for the PCDRA certification exam?
Most candidates prepare in 4–6 weeks, combining theory, hands-on practice, and mock tests to build practical understanding.
8. How long is the PCDRA certification valid?
The PCDRA certification is valid for two years from the date you pass the exam.
9. What are the job roles available after earning the PCDRA certification?
After certification, you can work as a Security Operations Center (SOC) Analyst, Cybersecurity Analyst, Threat Hunter, or Incident Responder.
10. What is the average salary of a Palo Alto Networks Certified Detection and Remediation Analyst?
On average, certified professionals earn between $85,000 and $110,000 per year, depending on experience and location.

Comments